Vulnerability Allows Hackers to Remotely Control Train Brakes

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 15, 2025 3 min read

Vulnerabilities in Train Brake Systems

Many trains in the U.S. face a serious security vulnerability that allows hackers to remotely engage the brakes. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged this issue, which could have catastrophic effects on passenger safety and freight operations. The flaw, tracked as CVE-2025-1727, has been known for over a decade but has only recently come to light due to increased scrutiny.

Independent researcher Neil Smith discovered this vulnerability in 2012. It stems from a weak authentication protocol used in the communication link between End-of-Train (EoT) and Head-of-Train (HoT) devices, primarily utilizing a simple BCH checksum for validation. This outdated security protocol enables attackers to craft malicious brake commands using software-defined radio equipment that costs less than $500.

Smith stated, “All of the knowledge to generate the exploit already exists on the internet. AI could even build it for you.” The physical proximity required for exploitation limits remote hacks but still poses a significant threat to operational safety.

Major EoT/HoT Vulnerability

The Association of American Railroads (AAR) has acknowledged the need to replace the insecure EoT and HoT protocols that link locomotives to the EoT devices, commonly known as “FREDs” (Flashing Rear End Devices). This decision comes more than 12 years after the issue was initially reported. The EoT devices collect telemetry and can receive commands from conductors, including the ability to apply brakes from the back of the train.

Neil Smith

Image courtesy of Risky Business

Smith’s initial report to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) did not lead to immediate action from the AAR, which downplayed the threat. Smith’s persistence, alongside the independent discovery of the same issue by another security researcher, Eric Reuter, eventually led to renewed attention on the vulnerability.

The AAR is set to replace the old protocol with the IEEE 802.16t Direct Peer-to-Peer (DPP) protocol, which promises better security and lower latency. However, this transition will involve replacing over 75,000 EoT devices across North America, a task expected to take 5-7 years and cost between $7-10 billion.

Exploitation Risks

The implications of this vulnerability are severe. Hackers could potentially disrupt rail operations by triggering emergency brakes remotely, leading to passenger injuries, derailments, and widespread transportation disruptions. CISA's advisory emphasizes that successful exploitation could allow attackers to send unauthorized brake control commands to the EoT devices.

Train Safety

Image courtesy of Security Affairs

Despite the risks, there have been no reported active exploitations so far. Smith warns against testing these vulnerabilities, citing the severe potential consequences, including loss of life. The delay in addressing this issue raises questions about industry accountability in safeguarding critical infrastructure.

Conclusion

The vulnerabilities in the train brake systems highlight significant gaps in cybersecurity within the railway industry. The lack of action over the years and the eventual acknowledgment of the issue underscore the need for urgent remediation. The transition to more secure protocols cannot come soon enough, as the current systems remain susceptible to exploitation.

For those interested in ensuring the safety of their operations or looking for advanced cybersecurity solutions, Gopher Security offers a range of services that can help mitigate these risks.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article